SYSTEMS AND METHODS FOR GENERATING RISK SCORES BASED ON ACTUAL LOSS EVENTS

    公开(公告)号:US20230316192A1

    公开(公告)日:2023-10-05

    申请号:US17859730

    申请日:2022-07-07

    CPC classification number: G06Q10/0635

    Abstract: In one embodiment, a method includes determining an attack tactic risk score for one or more attack tactics based on a dataset of actual loss events and determining an incident risk score for an incident based on the one or more attack tactic risk scores. The method also includes determining a priority value for an asset. The asset is associated with the incident. The method further includes generating an asset risk score for the asset based on the priority value of the asset and the incident risk score.

    SYSTEM AND METHOD FOR DETECTING MALICIOUS MESSAGES GENERATED BY A LARGE LANGUAGE MODEL (LLM)

    公开(公告)号:US20250023913A1

    公开(公告)日:2025-01-16

    申请号:US18351195

    申请日:2023-07-12

    Inventor: Michael Roytman

    Abstract: A system and method are provided for detecting malicious messages using a two-step Bayesian approach. A discrimination engine determines for each of the messages a first score and a second score. The first score represents a likelihood that the respective messages are malicious messages, and the second score represents a likelihood that they were generated by a machine learning (ML) method, such as a large language model (LLM). Using a combination of these two scores, message with a high probability of being malicious message are discriminated and marked as such. For example, messages for which the first and second scores exceed respective thresholds are marked as suspicious.

    SYSTEM AND METHOD FOR TRIAGING VULNERABILITIES BY APPLYING BUG REPORTS TO A LARGE LANGUAGE MODEL (LLM)

    公开(公告)号:US20240330480A1

    公开(公告)日:2024-10-03

    申请号:US18356178

    申请日:2023-07-20

    Inventor: Michael Roytman

    CPC classification number: G06F21/577 G06F21/563

    Abstract: A system and method are provided for predicting risks related to software vulnerabilities and thereby triaging said vulnerabilities. Input data (e.g., bug reports) are applied to a prediction engine (e.g., a machine learning (ML) method such as a large language model, a transformer neural network, or a classifier model), which outputs two or more scores for each vulnerability. A first score represents a likelihood of an exploit being developed (a threat), a second score represents a likelihood of being attacked (a greater threat), and a third score represents a likelihood of becoming a published common vulnerability and exposure (an even greater threat). Based on these scores, the vulnerabilities are triaged. Because the prediction engine is trained to make predictions using the unstructured data in bug reports, the vulnerabilities can be triaged soon after discovery, reducing the time to remediate vulnerabilities predicted to be significant threats.

Patent Agency Ranking